28.10.2016 Views

gender differential paper IJCRB

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ijcrb.webs.com<br />

JUNE 2011<br />

INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS VOL 3, NO 2<br />

Gotz, G. (2002) Sunk costs, windows of profit opportunities, and the dynamics of entry.<br />

International Journal of Industrial Organization 20(10), 1409–20.<br />

Hagel, J. and Rayport, J. (1997) The new infomediaries. TheMcKinsey Quarterly 4, 54–<br />

70.<br />

Holahan, Catherine (2006), Taking AIM at Targeted Advertising, Business Week Online,<br />

26.<br />

Horng-Twu Liaw (2004) A secure electronic voting protocol for general elections.<br />

Computers & Security (2004) 23, 107e119<br />

Iacobucci, D., 1996. Networks in Marketing. Sage Publications, Thousand Oaks.<br />

Iacobucci, D., and Ostrom, A., 1996 Commercial and interpersonal relationships: Using<br />

the structure of interpersonal relationshipsto understand individual-to-individual,<br />

individual-to firm, and firm-to-firm relationships in commerce. International journal of<br />

research in marketing 13, 53-72.<br />

Iacobucci, D., Henderson, G., Marcati, A. and Chang, J., 1996. Network analyses of<br />

brand switching behavior. International journal of research in Marketing 13, 415-429.<br />

International Biometric Industry Association (IBIA). Removing Export Controls on<br />

Biometric Technology. Report of February 2000. www.ibia.org/bxacomments.htm.<br />

InformationWeek, April 30, 2001, p. 22; cited by Bob Evans in “Privacy Vs. Paranoia”,<br />

InformationWeek, May 7, 2001, p. 172.<br />

Joe Pulizzi “On with the Content Marketing Revolution” Content Marketing Spending<br />

Survey, Annual study on content marketing and custom content for marketing<br />

professionals in North America, 2010<br />

James H. Moor. Toward a theory of Privacy in the Information Age. Computers and<br />

Society, 27(3): 27–32, 1997. In<br />

James L. Wayman. “Biometric Identification and the Financial Services Industry”.<br />

Jared Karro , Jie Wang, Towards a Practical, Secure, and Very Large Scale Online<br />

Election, Proceedings of the 15th Annual Computer Security Applications Conference,<br />

p.161, December 06-10, 1999<br />

Jones, Mitt (2000), Web Privacy: How the Cookie Crumbles, PC World, 18 (3), 49.<br />

Julia Scheeres. When Your Mole Betrays You. Wired News, 3/14/2001.<br />

www.wired.com/news/politics/0,1283,42353,00. html.<br />

Granova Anna & Eloff JHP, (2004) Online banking and identity theft: who carries the<br />

risk? Computer Fraud and Security page 7--8<br />

COPY RIGHT © 2011 Institute of Interdisciplinary Business Research 601

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!